6
11 Feb 2014Computer networks6 Posta Elettronica Certificata – PEC PEC to standard email: like a raccomandata semplice Sent proof Standard email to PEC: like a normal letter Sent and dispatched proves are legal proves Every citizen may have a free PEC address to communicate with public administration

17
11 Feb 2014Computer networks17 Comparison with handwritten signature Digital signatureHandwritten signature Who can sign Needs keys from certification authority and proper tools Everybody instantly Who can verifyEverybody (with proper tools)Handwriting analysts Verification reliability Sure for some years Subjective in dubious cases, no time limit Temporal duration Some years (can be renewed) Until other reliable signatures are available Mass signatures Some seconds for all documents (with proper tools) Some seconds per document Date reliabilityObjective if temporal mark Based on other subjective elements (papers and inks age)

28
11 Feb 2014Computer networks28 Attacks from outside Denial of Service zombie computers Firewall which internal program which external address what amount of traffic which kind of data Windows Seven Firewall

29
11 Feb 2014Computer networks29 Backup Why backup? Source: The Cost of Lost Data. The importance of investing in that ounce of prevention by David M. Smith